


default search action
42nd CRYPTO 2022, Santa Barbara, CA, USA - Part IV
- Yevgeniy Dodis, Thomas Shrimpton:

Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part IV. Lecture Notes in Computer Science 13510, Springer 2022, ISBN 978-3-031-15984-8
Secret Sharing and Secure Multiparty Computation
- Vipul Goyal, Antigoni Polychroniadou, Yifan Song:

Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing. 3-32 - Benny Applebaum

, Eliran Kachlon
, Arpita Patra
:
Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority - (Extended Abstract). 33-56 - Samuel Dittmer

, Yuval Ishai, Steve Lu
, Rafail Ostrovsky
:
Authenticated Garbling from Simple Correlations. 57-87
Unique Topics
- Brice Minaud, Michael Reichle

:
Dynamic Local Searchable Symmetric Encryption. 91-120 - Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov:

Programmable Distributed Point Functions. 121-151 - Yang Du, Daniel Genkin, Paul Grubbs:

Snapshot-Oblivious RAMs: Sub-logarithmic Efficiency for Short Transcripts. 152-181
Symmetric Key Theory
- Charlotte Lefevre, Bart Mennink:

Tight Preimage Resistance of the Sponge Construction. 185-204 - Aldo Gunsing:

Block-Cipher-Based Tree Hashing. 205-233 - Tim Beyne

, Yu Long Chen:
Provably Secure Reflection Ciphers. 234-263 - Jean Paul Degabriele, Vukasin Karadzic

:
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels. 264-295
Zero Knowledge
- Tiancheng Xie, Yupeng Zhang, Dawn Song:

Orion: Zero Knowledge Proof with Linear Prover Time. 299-328 - Carsten Baum

, Lennart Braun
, Alexander Munch-Hansen
, Peter Scholl
:
Moz$\mathbb {Z}_{2^k}$arella: Efficient Vector-OLE and Zero-Knowledge Proofs over $\mathbb {Z}_{2^k}$. 329-358 - Abhiram Kothapalli, Srinath T. V. Setty, Ioanna Tzialla:

Nova: Recursive Zero-Knowledge Arguments from Folding Schemes. 359-388 - Allen Kim, Xiao Liang

, Omkant Pandey:
A New Approach to Efficient Non-Malleable Zero-Knowledge. 389-418
Secure Multiparty Computation III
- Damiano Abram

, Ivan Damgård, Claudio Orlandi, Peter Scholl:
An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security. 421-452 - Benny Applebaum

, Yuval Ishai, Or Karni, Arpita Patra
:
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications. 453-482 - Vipul Goyal, Yuval Ishai, Yifan Song:

Tight Bounds on the Randomness Complexity of Secure Multiparty Computation. 483-513
Threshold Signatures
- Mihir Bellare

, Elizabeth C. Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, Chenzhi Zhu:
Better than Advertised Security for Non-interactive Threshold Signatures. 517-550 - Dan Boneh, Chelsea Komlo:

Threshold Signatures with Private Accountability. 551-581

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














